top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers
Autore Rogers Russ
Edizione [3rd ed.]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2004
Descrizione fisica 1 online resource (465 p.)
Disciplina 005.8
Soggetto topico Computers - Access control
Information technology - Management
ISBN 1-281-05637-5
9786611056377
0-08-048082-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles
Record Nr. UNINA-9910780114003321
Rogers Russ  
Rockland, MA, : Syngress Publishing, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers
Autore Rogers Russ
Edizione [3rd ed.]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2004
Descrizione fisica 1 online resource (465 p.)
Disciplina 005.8
Soggetto topico Computers - Access control
Information technology - Management
ISBN 1-281-05637-5
9786611056377
0-08-048082-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles
Record Nr. UNINA-9910816735503321
Rogers Russ  
Rockland, MA, : Syngress Publishing, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security assessment [electronic resource] : case studies for implementing the NSA IAM / Russ Rogers ... [et al.].
Security assessment [electronic resource] : case studies for implementing the NSA IAM / Russ Rogers ... [et al.].
Pubbl/distr/stampa Rockland, MA : Syngress, c2004
Descrizione fisica xxxiv, 429 p. : ill. ; 24 cm.
Disciplina 005.8
Altri autori (Persone) Rogers, Russ.author
Soggetto topico Computer security
Computers - Access control
Information technology - Security measures
Soggetto genere / forma Electronic books.
ISBN 9781932266962
1932266968
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends.
Record Nr. UNISALENTO-991003260989707536
Rockland, MA : Syngress, c2004
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Edizione [First edition.]
Pubbl/distr/stampa Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Descrizione fisica 1 online resource (342 pages) : illustrations, tables, graphs
Disciplina 005.8
Collana Discrete Mathematics and Its Applications
Soggetto topico Computer security
Computer networks - Security measures
Computers - Access control
Multidisciplinary design optimization
ISBN 0-429-09661-5
1-4200-8590-5
Classificazione COM059000COM043000TEC007000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen.
Record Nr. UNINA-9910792137803321
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Edizione [First edition.]
Pubbl/distr/stampa Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Descrizione fisica 1 online resource (342 pages) : illustrations, tables, graphs
Disciplina 005.8
Collana Discrete Mathematics and Its Applications
Soggetto topico Computer security
Computer networks - Security measures
Computers - Access control
Multidisciplinary design optimization
ISBN 0-429-09661-5
1-4200-8590-5
Classificazione COM059000COM043000TEC007000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen.
Record Nr. UNINA-9910800065703321
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Amultidisciplinary introduction to information security / / edited by Stig F. Mjolsnes
Edizione [First edition.]
Pubbl/distr/stampa Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Descrizione fisica 1 online resource (342 pages) : illustrations, tables, graphs
Disciplina 005.8
Collana Discrete Mathematics and Its Applications
Soggetto topico Computer security
Computer networks - Security measures
Computers - Access control
Multidisciplinary design optimization
ISBN 0-429-09661-5
1-4200-8590-5
Classificazione COM059000COM043000TEC007000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Introduction / S -- F -- Mjølsnes -- chapter 2 Security Electronics / E -- J -- Aas -- chapter 3 Public Key Cryptography / S -- O -- Smalø -- chapter 4 Cryptographic Hash Functions / D -- Gligoroski -- chapter 5 Quantum Cryptography / D -- R -- Hjelme -- chapter 6 Cryptographic Protocols / S -- F -- Mjølsnes -- chapter 7 Public Key Distribution / S -- F -- Mjølsnes -- chapter 8 Wireless Network Access / S -- F -- Mjølsnes -- chapter 9 Mobile Security / J -- A -- Audestad -- chapter 10 A Lightweight Approach to Secure Software Engineering / M -- G -- Jaatun -- chapter 11 ICT Security Evaluation / S -- J -- Knapskog -- chapter 12 ICT and Forensic Science / S -- F -- Mjølsnes -- chapter 13 Risk Assessment / S -- Haugen -- chapter 14 Information Security Management—From Regulations to End Users / E -- Albrechtsen.
Record Nr. UNINA-9910808331203321
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002
Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002
Disciplina 004.67/8/0951
Soggetto topico Computers - Access control
Internet - China
Freedom of information - China
Computer security - China
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Wired China
Record Nr. UNINA-9910693909803321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
At Work firewall / Matthew Strebe, Charles Perkins
At Work firewall / Matthew Strebe, Charles Perkins
Autore Strebe, Matthew
Pubbl/distr/stampa Milano : jackson libri, c2000
Descrizione fisica xxxvi, 492 p. : ill. ; 23 cm
Disciplina 005.8
Altri autori (Persone) Perkins, Charles Arthur, 1969-author
Soggetto topico Computer networks - Security measures
Computers - Access control
Firewalls (Computer security)
ISBN 8825617119
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991000355749707536
Strebe, Matthew  
Milano : jackson libri, c2000
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
WTMC '18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity / / ACM Digital Library ; Association for Computing Machinery-Digital Library
WTMC '18 : Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity / / ACM Digital Library ; Association for Computing Machinery-Digital Library
Pubbl/distr/stampa New York, NY : , : ACM, , 2018
Descrizione fisica 1 online resource (57 pages)
Disciplina 005.8
Soggetto topico Computer security
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910376157203321
New York, NY : , : ACM, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui